Funder
Universiti Sains Malaysia
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference43 articles.
1. Niu, Y., Zhang, J., Wang, A., & Chen, C. (2019). An efficient collision power attack on AES encryption in edge computing. IEEE Access, 7, 18734–18748. https://doi.org/10.1109/ACCESS.2019.2896256
2. Bhanot, R., & Hans, R. (2015). A review and comparative analysis of various encryption algorithms. International Journal of Security and its Applications, 9(4), 299–306. https://doi.org/10.14257/IJSIA.2015.9.4.27
3. Guo, S., Zhao, X., Zhang, F., Wang, T., Shi, Z., Standaert, F. X., & Ma, C. (2014). Exploiting the incomplete diffusion feature: A specialized analytical side-channel attack against the AES and its application to microcontroller implementations. IEEE Transaction on Information Forensics and Security, 9(6), 999–1014.
4. Schneier, B. (2009). Schneier on security: Another new AES attack. Retrieved 5 Sept 2016 from https://www.schneier.com/blog/archives/2009/07/another_new_aes.html
5. CISCO. (2019). Securing the internet of things: A proposed framework. Retrieved 16 Jan 2019 from http://www.cisco.com/c/en/us/about/security-center/secure-iot-proposed-framework.html
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献